Analysis
-
max time kernel
2s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:00
Behavioral task
behavioral1
Sample
23ac2d81fea6facbc3902139e14e5e4b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23ac2d81fea6facbc3902139e14e5e4b.exe
Resource
win10v2004-20231215-en
General
-
Target
23ac2d81fea6facbc3902139e14e5e4b.exe
-
Size
15.7MB
-
MD5
23ac2d81fea6facbc3902139e14e5e4b
-
SHA1
08f40a961c3ba7ed4d2b6f7295696ffbe8b303da
-
SHA256
07856d463630e953e218d3c66cb326a40a851c5dbbf3fb07ac64a8fc2f31d3b5
-
SHA512
5b7a68c8bc0fbe34761faf4c4577ebe432b2b59b168be0e549141500c6cfab9d0d066a773723897f4ae2e177be0dddbd274a0d7f46ce31e0a42b32e2904c5b4f
-
SSDEEP
393216:N/qbMrnMSDyUbMrnPbYbMrnMSDyUbMrnhZZbMrnMSDyUbMrnPbYbMrnMSDyUbMrn:NqbMrn1DyUbMrnzYbMrn1DyUbMrnhnbq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 23ac2d81fea6facbc3902139e14e5e4b.exe -
Executes dropped EXE 1 IoCs
pid Process 2276 23ac2d81fea6facbc3902139e14e5e4b.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 23ac2d81fea6facbc3902139e14e5e4b.exe -
resource yara_rule behavioral1/memory/2532-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2532-16-0x0000000024D90000-0x0000000024FEC000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2532 23ac2d81fea6facbc3902139e14e5e4b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2532 23ac2d81fea6facbc3902139e14e5e4b.exe 2276 23ac2d81fea6facbc3902139e14e5e4b.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2276 2532 23ac2d81fea6facbc3902139e14e5e4b.exe 25 PID 2532 wrote to memory of 2276 2532 23ac2d81fea6facbc3902139e14e5e4b.exe 25 PID 2532 wrote to memory of 2276 2532 23ac2d81fea6facbc3902139e14e5e4b.exe 25 PID 2532 wrote to memory of 2276 2532 23ac2d81fea6facbc3902139e14e5e4b.exe 25 PID 2276 wrote to memory of 2748 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 26 PID 2276 wrote to memory of 2748 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 26 PID 2276 wrote to memory of 2748 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 26 PID 2276 wrote to memory of 2748 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 26 PID 2276 wrote to memory of 2868 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 30 PID 2276 wrote to memory of 2868 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 30 PID 2276 wrote to memory of 2868 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 30 PID 2276 wrote to memory of 2868 2276 23ac2d81fea6facbc3902139e14e5e4b.exe 30 PID 2868 wrote to memory of 2284 2868 cmd.exe 28 PID 2868 wrote to memory of 2284 2868 cmd.exe 28 PID 2868 wrote to memory of 2284 2868 cmd.exe 28 PID 2868 wrote to memory of 2284 2868 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ac2d81fea6facbc3902139e14e5e4b.exe"C:\Users\Admin\AppData\Local\Temp\23ac2d81fea6facbc3902139e14e5e4b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\23ac2d81fea6facbc3902139e14e5e4b.exeC:\Users\Admin\AppData\Local\Temp\23ac2d81fea6facbc3902139e14e5e4b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\23ac2d81fea6facbc3902139e14e5e4b.exe" /TN QxutJGth3fd4 /F3⤵
- Creates scheduled task(s)
PID:2748
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN QxutJGth3fd4 > C:\Users\Admin\AppData\Local\Temp\uURdqm9tr.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2868
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN QxutJGth3fd41⤵PID:2284